Security in Cloud-Native Services: A Survey

T Theodoropoulos, L Rosa, C Benzaid, P Gray… - … of Cybersecurity and …, 2023 - mdpi.com
Cloud-native services face unique cybersecurity challenges due to their distributed
infrastructure. They are susceptible to various threats like malware, DDoS attacks, and Man …

GRACE: Empowering LLM-based software vulnerability detection with graph structure and in-context learning

G Lu, X Ju, X Chen, W Pei, Z Cai - Journal of Systems and Software, 2024 - Elsevier
Software vulnerabilities inflict considerable economic and societal harm. Therefore, timely
and accurate detection of these flaws has become vital. Large language models (LLMs) …

PatchFinder: A two-phase approach to security patch tracing for disclosed vulnerabilities in open-source software

K Li, J Zhang, S Chen, H Liu, Y Liu… - Proceedings of the 33rd …, 2024 - dl.acm.org
Open-source software (OSS) vulnerabilities are increasingly prevalent, emphasizing the
importance of security patches. However, in widely used security platforms like NVD, a …

Mitigating persistence of open-source vulnerabilities in maven ecosystem

L Zhang, C Liu, S Chen, Z Xu, L Fan… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Vulnerabilities from third-party libraries (TPLs) have been unveiled to threaten the Maven
ecosystem in the long term. Despite patches being released promptly after vulnerabilities …

Does the Vulnerability Threaten Our Projects? Automated Vulnerable API Detection for Third-Party Libraries

F Zhang, L Fan, S Chen, M Cai, S Xu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Developers usually use third-party libraries (TPLs) to facilitate the development of their
projects to avoid reinventing the wheels, however, the vulnerable TPLs indeed cause severe …

Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem

J Hu, L Zhang, C Liu, S Yang, S Huang… - Proceedings of the IEEE …, 2024 - dl.acm.org
Open-source software (OSS) greatly facilitates program development for developers.
However, the high number of vulnerabilities in open-source software is a major concern …

Enhancing Security through Modularization: A Counterfactual Analysis of Vulnerability Propagation and Detection Precision

MM Abdollahpour, J Dietrich… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
In today's software development landscape, the use of third-party libraries is near-
ubiquitous; leveraging third-party libraries can significantly accelerate development …

Adversarial Analysis of Software Composition Analysis Tools

E Ivanova, N Stakhanova, B Sistany - International Conference on …, 2024 - Springer
With the widespread use of third-party code in software projects, Software Composition
Analysis (SCA) tools emerged in order to help developers and security specialists automate …

The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications

Y Wu, C Liu, Y Liu - arxiv preprint arxiv:2311.09881, 2023 - arxiv.org
With the boom in modern software development, open-source software has become an
integral part of various industries, driving progress in computer science. However, the …

Vulnerability Root Cause Function Locating For Java Vulnerabilities

L Zhang - Proceedings of the 2024 IEEE/ACM 46th International …, 2024 - dl.acm.org
Software Composition Analysis has emerged as an essential solution for mitigating
vulnerabilities within the dependencies of software projects. Reachability analysis has been …